This section explains how to configure the operating environment for the SS.
Configure the following settings for managed smart devices (Android or iOS).
Android
Enable management of Android devices
Execute swss_config.exe (SS environment setup command) with the /Android.enabled option
Specify the IP address or host name of CS.
Execute swss_config.exe with the /cs.host option.
If necessary, change the port number.
Refer to "How to Modify the Port Number" in the Systemwalker Desktop Patrol Reference Manual for details.
Configure the settings for HTTPS communication and build the certificate environment.
Refer to "2.8.2.2 Settings for HTTPS Communication" for details.
This step is also performed if iOS devices are managed. If managing both Android and iOS devices, perform this step only once.
Use SWDTP_ctrl.exe (batch starting services command) to start Systemwalker Desktop Patrol.
iOS
Point
Steps 1 to 4 can be perform in a single command execution.
Enable management of iOS devices
Execute swss_config.exe (SS environment setup command) with the /iOS.enabled option
Specify the IP address or host name of CS.
Execute swss_config.exe with the /cs.host option.
This step is also if performed if Android devices are managed. If managing both iOS and Android devices, execute this step only once.
Specify the server or reverse proxy to be connected from iOS devices.
Execute swss_config.exe with the /iOS.connect.host, /iOS.connect.port, and /iOS.connect.profile.port. options.
Specify the IP address or host name of the iOS management database.
Execute swss_config.exe with the /iOSmgr.host option.
If iOS devices are being managed only by Systemwalker Desktop Patrol, specify the CS. But if they are also being managed by Systemwalker Desktop Keeper, specify either the CS or the Systemwalker Desktop Keeper management server that is operating the iOS management database. Once set, do not change this value.
If necessary, change the port number.
Refer to "How to Modify the Port Number" in the Systemwalker Desktop Patrol Reference Manual for details.
Configure the settings for HTTP communication and build the certificate environment.
Refer to "2.8.2.2 Settings for HTTPS Communication" for details.
This step is also performed if Android devices are managed. If managing both Android and iOS devices, perform this step only once.
Use swss_ImportAppleCert.bat (registering Apple Inc. certificates command) to install the MDM certificate prepared in "2.2 Advance Preparation".
Use SWDTP_ctrl.exe (batch starting services command) to start Systemwalker Desktop Patrol.
Note
Notes regarding coexistence with the Systemwalker Desktop Keeper Smart Device Relay Server
The following options of swss_config.exe (SS environment setup command) in steps 1 to 5, are only used in Systemwalker Desktop Patrol.
- /cs.host
- /cs.port
- /Android.http.port
- /Android.https.port
- /Android.enabled
- /usercert.enabled
- /iOS.enabled
The following options of swss_config.exe (SS environment setup command), are common options also used in Systemwalker Desktop Keeper.
- /iOSmgr.host
- /iOSmgr.port
- /iOS.profile.port
- /iOS.https.port
- /iOS.connect.host
- /iOS.connect.port
- /iOS.connect.profile.port
The items set in steps 6 and 7 are also used in Systemwalker Desktop Keeper.
For items also used in Systemwalker Desktop Keeper, specify the same values in both products.
After the items are set in Systemwalker Desktop Patrol, specifying different values in Systemwalker Desktop Keeper will result in the settings initially configured in this product changed to the new values specified in Systemwalker Desktop Keeper. Conversely, after the items are set in Systemwalker Desktop Keeper, specifying different values in this product will result in the settings initially configured in Systemwalker Desktop Keeper changed to the new values specified in this product.
To use HTTPS communication between SS and the smart device CT, configure the settings as shown below. The configuration procedure depends on whether the server certificate is prepared by the customer or is the Systemwalker certificate.
Note
If this product coexists with the smart device relay server of Systemwalker Desktop Keeper and a certificate is registered in Systemwalker Desktop Keeper after another certificate is registered in Systemwalker Desktop Patrol, then the certificate registered in Systemwalker Desktop Keeper will be the one used for HTTPS communication between iOS smart devices and the SS.
Settings during installation
During installation, follow the steps below to configure the settings.
Use swss_makecsr.exe to generate the certificate signature request for the server certificate.
Send the certificate signature request generated in step 1 to the CA, to obtain the CA certificate (intermediate CA certificate) and server certificate issued by the CA.
Use SWDTP_ctrl.exe to stop Systemwalker Desktop Patrol.
Use swss_importcert.exe to register the CA certificate (intermediate CA certificate) obtained in step 2.
Use swss_importcert.exe to register the server certificate obtained in step 2.
Use swss_config.exe to enable the use of the server certificate prepared by the customer.
Use SWDTP_ctrl.exe to start Systemwalker Desktop Patrol.
Refer to the Systemwalker Desktop Patrol Reference Manual for details on these commands.
Note
If step 5 is mistakenly performed before step 4, restart the procedure from step 1.
Execute swss_makecsr.exe with the /certfile option to generate a server certificate.
Use SWDTP_ctrl.exe to stop Systemwalker Desktop Patrol.
Execute swss_importcert.exe with the /CACERT option to register the CA certificate for Systemwalker.
Use swss_importcert.exe to register the server certificate obtained in step 1.
Use swss_config.exe to enable the use of the Systemwalker server certificate.
Use SWDTP_ctrl.exe to start Systemwalker Desktop Patrol.
Refer to the Systemwalker Desktop Patrol Reference Manual for details on these commands.
Note
If step 4 is mistakenly performed before step 3, repeat the procedure from step 1.
Certificate renewal settings
Follow the steps below to configure the certificate renewal settings:
Use swss_makecsr.exe to generate the certificate signature request for the server certificate.
Send the certificate signature request generated in step 1 to the CA, to obtain the server certificate issued by the CA.
Use SWDTP_ctrl.exe to stop Systemwalker Desktop Patrol.
Use swss_importcert.exe to register the server certificate obtained in step 2.
Use SWDTP_ctrl.exe to start Systemwalker Desktop Patrol.
Refer to the Systemwalker Desktop Patrol Reference Manual for details on these commands.
Execute swss_makecsr.exe with the /certfile option to generate a server certificate.
Use SWDTP_ctrl.exe to stop Systemwalker Desktop Patrol.
Use swss_importcert.exe to register the server certificate obtained in step 1.
Use SWDTP_ctrl.exe to start Systemwalker Desktop Patrol.
Refer to the Systemwalker Desktop Patrol Reference Manual for details on these commands.